Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods

Heba A. Hassan, E. E. Hemdan, W. El-shafai, Mona Shokair, F. A. Abd El‐Samie
{"title":"Detection of attacks on software defined networks using machine learning techniques and imbalanced data handling methods","authors":"Heba A. Hassan, E. E. Hemdan, W. El-shafai, Mona Shokair, F. A. Abd El‐Samie","doi":"10.1002/spy2.350","DOIUrl":null,"url":null,"abstract":"Software‐defined networks (SDNs) have gained popularity in recent years as a solution for the fundamental issues that affect traditional dispersed networks. The primary advantage of SDNs is the decoupling of the control plane from the data plane, which increases the flexibility of the network. The SDN represents a network architecture of the next generation, however, its configuration options are centralized, leaving it open for cyber‐attacks. This paper concentrates on the early identification of attacks in an SDN environment. When malicious traffic is affecting in an SDN topology, an artificial intelligence (AI) module in the topology is used to detect the attack and stop the attack source using machine learning (ML) techniques. The architecture presented in this research allows for the comparison of several ML classification techniques that are used to identify different sorts of network attacks. For attack detection, eight ML techniques are used, namely logistic regression (LR), linear discriminant analysis (LDA), Naïve Bayes (NB), k‐nearest neighbor (KNN), classification and regression tree (CART), AdaBoost (AB), random forest (RF), and support‐vector machine (SVM) classifiers. These techniques are tested on the InSDN dataset, which is a novel attack‐specific SDN dataset. The results show that the highest accuracy of 98.6% is achieved with the LDA classifier. Further improvement in the accuracy of classification models is observed when random over‐sampling, synthetic minority oversampling technique (SMOTE), random under‐sampling, and under‐sampling with Tomek links and near‐miss concept are applied to address the class imbalance problem. After applying these methods, the LDA classifier showed an accuracy of 98.79%.","PeriodicalId":506233,"journal":{"name":"SECURITY AND PRIVACY","volume":"72 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"SECURITY AND PRIVACY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.350","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Software‐defined networks (SDNs) have gained popularity in recent years as a solution for the fundamental issues that affect traditional dispersed networks. The primary advantage of SDNs is the decoupling of the control plane from the data plane, which increases the flexibility of the network. The SDN represents a network architecture of the next generation, however, its configuration options are centralized, leaving it open for cyber‐attacks. This paper concentrates on the early identification of attacks in an SDN environment. When malicious traffic is affecting in an SDN topology, an artificial intelligence (AI) module in the topology is used to detect the attack and stop the attack source using machine learning (ML) techniques. The architecture presented in this research allows for the comparison of several ML classification techniques that are used to identify different sorts of network attacks. For attack detection, eight ML techniques are used, namely logistic regression (LR), linear discriminant analysis (LDA), Naïve Bayes (NB), k‐nearest neighbor (KNN), classification and regression tree (CART), AdaBoost (AB), random forest (RF), and support‐vector machine (SVM) classifiers. These techniques are tested on the InSDN dataset, which is a novel attack‐specific SDN dataset. The results show that the highest accuracy of 98.6% is achieved with the LDA classifier. Further improvement in the accuracy of classification models is observed when random over‐sampling, synthetic minority oversampling technique (SMOTE), random under‐sampling, and under‐sampling with Tomek links and near‐miss concept are applied to address the class imbalance problem. After applying these methods, the LDA classifier showed an accuracy of 98.79%.
利用机器学习技术和不平衡数据处理方法检测对软件定义网络的攻击
近年来,软件定义网络(SDN)作为解决影响传统分散网络的基本问题的一种解决方案,越来越受到人们的青睐。SDN 的主要优势在于将控制平面与数据平面解耦,从而提高了网络的灵活性。SDN 代表了下一代网络架构,但其配置选项是集中式的,因此容易受到网络攻击。本文主要研究如何在 SDN 环境中及早识别攻击。当 SDN 拓扑中的恶意流量受到影响时,拓扑中的人工智能(AI)模块将利用机器学习(ML)技术检测攻击并阻止攻击源。本研究提出的架构允许对用于识别不同类型网络攻击的几种 ML 分类技术进行比较。在攻击检测方面,使用了八种 ML 技术,即逻辑回归 (LR)、线性判别分析 (LDA)、奈夫贝叶斯 (NB)、k-近邻 (KNN)、分类和回归树 (CART)、AdaBoost (AB)、随机森林 (RF) 和支持向量机 (SVM) 分类器。这些技术在 InSDN 数据集上进行了测试,该数据集是针对特定攻击的新型 SDN 数据集。结果表明,LDA 分类器的准确率最高,达到 98.6%。在应用随机过度采样、合成少数群体过度采样技术(SMOTE)、随机低度采样以及带有 Tomek 链接和近错概念的低度采样来解决类不平衡问题时,分类模型的准确率得到了进一步提高。采用这些方法后,LDA 分类器的准确率达到 98.79%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信